SECURITY EQUIPMENT Homework Task
1. Read Potts et.al Network security Ch 3 pp 108-110 and Ch 8 Security Equipment pp231-242. Complete questions p117 Network Security and p 256 Security Equipment
2. Make sure you update your glossary you should have an understanding of all the words below.
3. You will become an expert in one of these areas. We will discuss and allocate this before end of term. You need to produce a PowerPoint presentation summarising your area after you have done research. Some resources have been provided but you need to come up with at least 2 other resources.This will be presented first day next term.
This is part of Unit 4 SAC 2. Other resources http://www.sans.org/reading_room/
Biometrics refers to the automatic identification of a person based on certain physiological or behavioural characteristics. They are input devices which require hardware and software.
Give some examples of biometric devices that have been developed and how they are used to secure data.
Rachel
Digital Signatures, Swipe Cards, Smart Cards, Security Tokens
Give examples of magnetic, optical and steady state storage devices.
What type of backup hardware would you use to backup: qYour school assignment qYour home computer qFile server of a small organisation qFile server of a large organisation
What is remote backup? (or on-line backup)
What are the following ·Desktop monitoring programs (Observe what we have at school) ·Log files ·Closed-circuit TV ·Telephone monitoring ·Audit trails
How does surveillance work in the workplace?
Encryption is the action of encoding or “scrambling” information so that it is no longer easily readable. –Symmetric encryption-relies on both sender and receiver of message knowing the key.
–Asymmetric or public key encryption-uses different keys to encrypt and decrypt. Users are given a public key to encrypt and a private key used to decrypt the message. How does encryption software work?
What is Symmetric encryption? How does it work?
What is Public key encryption? How does it work?
Alex
Malware
anti-virus software
spyware and adware protection
Potts et. al Ch 3 pp 109
Potts et. al Ch 8 pp 236-237
How do trojans, email viruses and worms work?
Give some examples of each?
What's difference between antivrus and spyware?
What is a hoax? spam?Phishing?
Homework Task
1. Read Potts et.al Network security Ch 3 pp 108-110 and Ch 8 Security Equipment pp231-242. Complete questions p117 Network Security and p 256 Security Equipment
2. Make sure you update your glossary you should have an understanding of all the words below.
3. You will become an expert in one of these areas. We will discuss and allocate this before end of term. You need to produce a PowerPoint presentation summarising your area after you have done research. Some resources have been provided but you need to come up with at least 2 other resources.This will be presented first day next term.
This is part of Unit 4 SAC 2.
Other resources
http://www.sans.org/reading_room/
Biometrics.pptx
Fingerprint articleshttp://www.time.com/time/business/article/0,8599,1665119,00.html?imw=Y
http://www.theage.com.au/news/national/schools-to-fingerprint-students-for-security/2007/09/01/1188067438565.html
http://www.theage.com.au/articles/2003/05/06/1051987684696.html
http://www.wired.com/science/discoveries/news/2003/10/61010
Face recognition software
http://download.cnet.com/FaceMetrix/3000-2653_4-10507991.html?tag=lst-0-3
They are input devices which require hardware and software.
Give some examples of biometric devices that have been developed and how they are used to secure data.
http://money.howstuffworks.com/personal-finance/debt-management/magnetic-stripe-credit-card.htm
http://money.howstuffworks.com/personal-finance/debt-management/credit-card.htm
Digital Signatures
http://computer.howstuffworks.com/digital-signature.htm
Explain how these technologies work.
Online BackUp
Online/Remote backup
http://www.remotebackup.com.au/
What type of backup hardware would you use to backup:
q Your school assignment
q Your home computer
q File server of a small organisation
q File server of a large organisation
What is remote backup? (or on-line backup)
http://www.abc.net.au/science/slab/security/default.htm
http://science.nasa.gov/headlines/y2003/26mar_visar.htm
http://en.wikipedia.org/wiki/Packet_sniffing
· Desktop monitoring programs (Observe what we have at school)
· Log files
· Closed-circuit TV
· Telephone monitoring
· Audit trails
How does surveillance work in the workplace?
Potts et. al Ch 8 pp 236-237
http://www.f-secure.com/en_EMEA/
http://en.wikipedia.org/wiki/Remote_backup_service
Potts et. al Ch 8 pp 236-237
–Symmetric encryption-relies on both sender and receiver of message knowing the key.
–Asymmetric or public key encryption-uses different keys to encrypt and decrypt. Users are given a public key to encrypt and a private key used to decrypt the message.
How does encryption software work?
What is Symmetric encryption? How does it work?
What is Public key encryption? How does it work?
Potts et. al Ch 8 pp 236-237
http://us.trendmicro.com/us/home/
http://www.mcafee.com/us/
http://vmyths.com/
Give some examples of each?
What's difference between antivrus and spyware?
What is a hoax? spam?Phishing?
Potts et. al Ch 8 pp 242
http://en.wikipedia.org/wiki/Firewalls
Use a diagram to help explain how firewalls work?
Give some examples of firewalls on the market.
Potts et. al Ch 8 pp 241